STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to HPE 3PAR StoreServ 3.3.x Security Technical Implementation Guide

V-255284

CAT II (Medium)

The HPE 3PAR OS must be configured to offload audit records onto a different system or media from the system being audited.

Rule ID

SV-255284r958754_rule

STIG

HPE 3PAR StoreServ 3.3.x Security Technical Implementation Guide

Version

V2R1

CCIs

CCI-001851

Discussion

Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common process in information systems with limited audit storage capacity. Satisfies: SRG-OS-000342-GPOS-00133, SRG-OS-000479-GPOS-00224

Check Content

Verify offloading of security syslog events with 

cli% showsys -d

Find the output section "Remote Syslog Status".

If "Active" is not "1", this is a finding.

If "Security Server" is not defined, this is a finding.

If "Security Connection" is not "TLS", this is a finding.

Fix Text

Configure the remote syslog host:

cli% setsys RemoteSyslogSecurityHost <hostname> <address-spec> [:port]

The hostname, and address are both required. If both IPv4 and IPv6 addresses are supplied, the IPv6 address must be enclosed in []. The default port is 6514 utilizing TLS.

Import the ca certificate that will have signed the syslog server:

cli% importcert syslog-sec-server -ca stdin

Copy and paste the PEM format of the appropriate CA as instructed.

Configure the system to utilize remote syslog:

cli% setsys RemoteSyslog 1